According an internal investigation Snowden has leaked the secret NSA’documents using a web crawler software designed to search, index and backup a website. The last assumption of the Snowden case is related to the way the whistleblower has collected the huge quantity of secret document from the National Security Agency (NSA). The leaked documents have shown […]
According to NBC News, Olympics attendees are being hacked just the arrive in Sochi,  the reporter Richard Engel demonstrated it conducting an experiment. Sochi Olympics are starting, but Intelligence agencies of all participating governments fear the possibility of an terrorist attack or a cyber attack. The event is a great occasion for hackers, hacktivists and cyber criminals which […]
The cyber security expert Ebrahim Hegazy has found a Remote Code Execution vulnerability in a Yahoo server hosting numerous sub-domains. The cyber security expert Ebrahim Hegazy has found a serious flaw, as explained by the analyst the website is affected by a Remote Code Execution vulnerability. During the test Hegazy discovered first a Remote PHP Code […]
100 lines of code could hack new Snapchat people verification feature that displays nine images and requests new user to select the one containing a ghost. Snapchat is considered by many security experts a case study on how a lack of security by design could hit a large community of users impacting their privacy, a few […]
Kaspersky Lab malware expert Dmitry Bestuzhev revealed a large-scale spam email campaign that is advertising the PC version of the mobile WhatsApp app to spread a banking trojan. A large-scale spam email campaign is advertising the PC version of the popular mobile messaging application WhatsApp, itâs a pity that the application does not actually exist […]
SplashData has issued its Annual â25 Worst Passwords of the Yearâ enumerating the list of the most common password chosen by users. It was October 2012 when for the first time I’ve seen a report from SpashData on most common passwords chosen by users to protect their account on various services. SplashData, which develops password […]
Hackers from the group TeamBerserk announced to have leaked numerous sensitive documents from systems of some DHS Intelligence Fusion Centers. The Group of hackers known as TeamBerserk claim to have stolen 54mb of compressed documents from the systems of some US Department of Homeland Security (DHS) Intelligence Fusion Centers. The group announced it with a Tweet: […]
Security researcher Daniel E. Wood discovered a vulnerability in the Starbucks official iOS app related to the insecure storage of user data. 10 million Starbucks customers who purchases drinks and food using their Smartphones are exposed to serious risk of data breach. This is yet another story in which a poor implementation of minimum security […]
If you desire to read the details on each of the above components and discover how NSA used it please read my article at Infosec Institute “How the NSA Monitors Target Computers with Radar Wave Devices” Introduction Germanyâs Der Spiegel has published a couple of disturbing articles on the NSA surveillance activities. The media agency has focused its articles on […]
IT administrator at Monju Nuclear Power Plant discovered that a malware-based attack infected a system in the reactor control room. On January 2nd one of the eight computers in the control room at Monju Nuclear Power Plant was compromised. An IT administrator has discovered that the system in the reactor control room had been accessed over […]